US20030145091A1 - Access terminal profile in a data cellular network - Google Patents
Access terminal profile in a data cellular network Download PDFInfo
- Publication number
- US20030145091A1 US20030145091A1 US10/059,522 US5952202A US2003145091A1 US 20030145091 A1 US20030145091 A1 US 20030145091A1 US 5952202 A US5952202 A US 5952202A US 2003145091 A1 US2003145091 A1 US 2003145091A1
- Authority
- US
- United States
- Prior art keywords
- access
- data
- additional
- select
- network
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/18—Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
- H04W12/062—Pre-authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0892—Network architectures or network communication protocols for network security for authentication of entities by using authentication-authorization-accounting [AAA] servers or protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/18—Selecting a network or a communication service
Definitions
- the present invention relates generally to data cellular networks, and specifically to feature control in data cellular networks.
- High Data Rate is a technology originally developed for dedicated packet data applications to meet the increasing demand for wireless Internet Protocol (IP) connectivity with high spectral efficiency.
- IP Internet Protocol
- Voice transmissions require low data rates, but maintain stringent delay and jitter requirements.
- Packet data transmissions typically require bursty high data rates, with less stringent delay and jitter requirements.
- the HDR principle is to separate high-speed data completely from the voice network, so that the packet data requirements can be fulfilled optimally and independently.
- the CDMA Development Group accepted HDR as the 1xEvaluation Phase One: Data Only (1xEV DO or 1xEV Phase 1), with minor requirements for improvements.
- data-only (DO) mobile terminals hereinafter referred to as Access Terminals (AT)
- AT utilize data services by initiating data sessions with data-only base stations, hereinafter referred to as Access Networks (AN).
- the AN's transmit and receive data packets to and from AT's over the air interface, and support packet data speeds above 144 kbps.
- AT refers to both DO terminals that utilize only data services and hybrid mobile terminals that are capable of utilizing both data services and voice services, but are currently operating in data mode.
- an AT requests from a serving AN a Unicast Access Terminal Identifier (UATI) that uniquely identifies the AT within the serving AN.
- UATI Unicast Access Terminal Identifier
- the AT engages in a session protocol negotiation and authentication process with the serving AN for the data session.
- the AT initiates Point-to-Point Protocol (PPP) and Link Control Protocol (LCP) negotiations for access authentication towards an Authentication, Authorization and Accounting (AAA) server via the AN.
- PPP Point-to-Point Protocol
- LCP Link Control Protocol
- AAA Authentication, Authorization and Accounting
- the AAA server maintains the subscriber information for authentication, authorization and accounting purposes.
- the AN After successful authentication, the AN stores session information, such as supported protocols, authentication keys and Mobile Network ID (MNID) for later use in communications between the AT and the AN during the session.
- the UATI acts as a pointer to the session records within the AN.
- Packet data services for the data session are provided through a Packet Data Serving Node (PDSN) that interfaces between the transmission of data in the packet switched data network (e.g., Internet or Intranet), and the transmission of data over the air interface to/from the AT.
- PDSN Packet Data Serving Node
- the present invention provides an Access Terminal (AT) profile for identifying data services subscribed to by a data-only (DO) AT or hybrid AT in data mode within a data cellular network, such as a 1xEV DO cellular network.
- the subscriber AT profile is stored in a home Access, Authentication and Accounting (AAA) server associated with a home Access Network (AN) of the AT.
- AAA Access, Authentication and Accounting
- the subscriber AT profile stored in the home AAA server can be downloaded to the home AN at successful authentication.
- the current session record in the AN is expanded to include the subscriber profile.
- the subscriber AT profile can be downloaded from the home AAA server to the visitor AAA server, prior to downloading the subscriber AT profile to the visiting AN.
- any subscriber profile feature-based service can be controlled by the AN for the lifetime of the AT session.
- FIG. 1 is a block diagram illustrating a 1xEV DO cellular network
- FIG. 2 is a flowchart illustrating the steps for initiating a data session within a 1xEV DO cellular network
- FIG. 3 is a block diagram illustrating an exemplary subscriber AT profile within a data cellular network, in accordance with embodiments of the present invention
- FIG. 4 is a flow diagram illustrating exemplary signaling for downloading the subscriber AT profile from the home AAA server to the home AN, in accordance with embodiments of the present invention
- FIG. 5 is a block diagram illustrating an AT roaming scenario within a subnet of a data cellular network, in accordance with embodiments of the present invention
- FIG. 6 is a flow diagram illustrating exemplary signaling for transferring the subscriber AT profile from the home AN to a visitor AN within the same subnet, in accordance with embodiments of the present invention
- FIG. 7 is a block diagram illustrating an AT roaming scenario within a different subnet of a data cellular network, in accordance with embodiments of the present invention.
- FIG. 8 is a flow diagram illustrating exemplary signaling for downloading the subscriber AT profile from the home AAA server to a visitor AAA server to initiate a data session, in accordance with embodiments of the present invention.
- FIG. 1 illustrates the basic architecture of a 1xEV DO cellular network 10 .
- An Access Terminal (AT) 20 is in wireless communication with an Access Network (AN) 30 for data services.
- the AT 20 is a device providing data connectivity to a user.
- an AT 20 may be connected to a computing device, such as a laptop personal computer, or the AT 20 may be a self-contained data device, such as a personal digital assistant, the latter being illustrated.
- the AN 30 is the network equipment that provides data connectivity between a packet switched data network 60 (e.g., the Internet or an Intranet) and the ATs 20 .
- a packet switched data network 60 e.g., the Internet or an Intranet
- each AN 30 can include the equivalent of one or more Base Transceiver Stations (BTSs) 32 (e.g., the physical RF interface equipment) and a Base Station Controller (BSC) 35 .
- BTSs Base Transceiver Stations
- BSC Base Station Controller
- Each BTS 32 provides a separate 1.25 MHZ data-only (DO) carrier for high data rate applications for each sector (or cell) served by the BTS 32 .
- the BSC 35 is connected to each BTS 32 within the AN 30 via a respective Abis interface.
- the BSC 35 is responsible for operation, maintenance and administration of the BTSs 32 and handling the radio resources. It should be understood that the BSC 35 may be a separate node or may be co-located with one or more BTSs 32 .
- All of the BSC's 35 within a Color Code area or subnet 80 are connected together via respective A13 interfaces. It should be noted that each subnet includes up to 256 neighboring AN's that are allowed to transfer session information between each other.
- Packet data services are provided through a Packet Data Serving Node (PDSN) 50 that interfaces between the transmission of data in the packet switched data network 60 , and the transmission of data over the air interface to/from the AT 20 .
- the PDSN 50 interfaces with the AN 30 though a Packet Control Function (PCF) 40 , which may or may not be co-located with the AN 30 .
- PCF Packet Control Function
- the interface between the AN 30 and the PCF 40 is referred to as the A8/A9 interface, and the interface between the PCF 40 and the PDSN 50 is referred to as the A10/A11 interface.
- Access authentication of the AT 20 is performed by an Authentication, Authorization and Accounting (AAA) server 70 via an A12 interface between the AN 30 (BSC 35 ) and the AAA server 70 .
- AAA Authentication, Authorization and Accounting
- the 1xEV DO network there are three packet data service states: Active/Connected, Dormant and Null/Inactive.
- Active/Connected state a physical traffic channel exists between the AT 20 and the AN 30 , and either node may send data.
- Dormant state no physical traffic exists between the AT 20 and the AN 30 , but a Point-to-Point Protocol (PPP) link is maintained between the AT 20 and the PDSN 50 .
- PPP Point-to-Point Protocol
- the Null/Inactive state there is no physical traffic channel between the AT 20 and the AN 30 and no PPP link between the AT 20 and the PDSN 50 .
- the A8 connection is maintained during the Active/Connected state and released during transition to the Dormant or Null/Inactive state, while the A10 connection is maintained during the Active/Connected state and the Dormant state.
- a data session refers to a shared state between the AT 20 and AN 30 .
- This shared state stores at least the protocols and protocol configurations that are used for communication between the AT 20 and the AN 30 during the data session.
- the protocols and protocol configurations of the data session are negotiated between the AT 20 and AN 30 during initiation of the data session.
- a connection refers to a particular state of an air-link (e.g., a physical traffic channel being assigned or not assigned) between the AT 20 and AN 30 .
- the AT 20 and the AN 30 can open and close a connection multiple times.
- an AT sends a Unicast Access Terminal Identifier (UATI) request to the AN (step 200 ).
- UATI Unicast Access Terminal Identifier
- the UATI uniquely identifies the AT within the AN, and further includes an 8-bit field that identifies the Color Code of the AN within a Color Code Area or subnet.
- the AT engages in a session protocol negotiation process with the serving AN (step 210 ).
- the session protocol negotiation process involves the negotiation of protocols and protocol configurations for a session associated with the AT, and the storage of the protocols and protocol configurations within the AT and AN for later use in communications between the AT and the AN during the session.
- the UATI acts as a pointer to the session records within the AN.
- the AT initiates Point-to-Point Protocol (PPP) and Link Control Protocol (LCP) negotiations for access authentication (step 220 ).
- the access authentication process involves the AN generating a random challenge and sending the random challenge to the AT in a Challenge Handshake Authentication Protocol (CHAP) Challenge packet.
- CHAP Challenge Handshake Authentication Protocol
- the AN receives the CHAP response packet from the AT, the AN sends an Access-Request message based on the RADIUS protocol to the AAA server.
- the AAA server looks up a password based on the user-name attribute in the Access-Request message, and if authentication passes, the AAA server sends an Access-Accept packet containing a RADIUS attribute having the mobile node identification (MN ID) therein to the AN.
- MN ID mobile node identification
- the AN returns an indication of CHAP authentication success to the AT.
- the MN ID is used on the A8/A9 and A10/A11 interfaces to permit handoffs of PDSN packet data sessions
- the PCF initiates the setup of an A10 connection with the PDSN (step 230 ), while the AT is in a Dormant state.
- the AT can transition from the Dormant state to the Active/Connected state at any time during the session (step 240 ).
- the AT can send a connection request message to the AN, which in turn allocates radio resources (e.g., a physical traffic channel) to the AT (step 250 ) for use in sending/receiving data packets to/from the packet switched data network (step 260 ). If the AT does not transition to the Active/Connected state, the session remains open for a default duration of 54 hours.
- radio resources e.g., a physical traffic channel
- the session duration can vary depending upon the particular implementation.
- the AT At the expiration of the original session (step 270 ), to be able to transmit/receive data packets, the AT must initiate a new data session (step 200 ) and engage in a new session protocol and authentication negotiation process (steps 210 and 220 ) for the new data session.
- the protocols and protocol configurations for each data session may differ between AT's and/or between AN's, the protocols and protocol configurations are dependent upon the type of AT and the protocols supported by the AN, and therefore, not under the control of the mobile subscriber (i.e., the mobile subscriber cannot subscribe to any of the protocols or protocol configurations).
- a centralized database such as a Home Location Register
- data cellular networks have not been able to provide feature-based services to ATs.
- feature-based services could include multiple PPP sessions, priority delivery from PDSN and blocking of incoming voice calls during a data call (for hybrid ATs).
- a subscriber AT profile 310 containing subscribed services can be stored in a home Access, Authentication and Accounting (AAA) server 70 associated with a home Access Network (AN) 30 of the AT 20 .
- the home AAA server 70 can maintain a subscriber AT profile 310 for each AT 20 registered with the associated AN 30 .
- Authentication information 300 for each AT 20 points to the respective subscriber AT profile 310 . Therefore, upon successful authentication, the subscriber AT profile 310 can be easily located in the AAA server 70 .
- the subscriber AT profile 310 stored in the home AAA server 70 can be downloaded to the home AN 30 , along with the Access-Accept packet containing the MN ID, at successful authentication.
- the current session record 350 in the AN 30 (e.g., BSC 35 ) is also expanded to include the subscriber AT profile 310 .
- any subscriber profile feature services can be controlled by the AN 30 during the data session.
- the AN 30 can prioritize the sending of data packets to the AT 20 based on the priority delivery service features (e.g., packets from a certain IP address to the AT 20 are sent before packets from other IP addresses, packets to the AT 20 are sent before other AT packets, etc.).
- the AN 30 can establish an additional A10 connection (shown in FIG. 1) with the PDSN 50 (shown in FIG. 1) for the AT 20 to enable the AT 20 to download multiple data packets simultaneously (e.g., the AT 20 can access two web sites at the same time).
- the AN 30 discards the session record, including the subscriber AT profile 310 .
- FIG. 4 The exemplary signaling involved in downloading the subscriber AT profile to the AN 30 is illustrated in FIG. 4.
- UATI Unicast Access Terminal Identifier
- the AT 20 engages in a session protocol negotiation process with the serving AN 30 (step 410 ), as described above.
- the AN 30 creates a session record for the data session and stores the negotiated protocols and protocol configurations therein for later use in communications between the AT 20 and the AN 30 during the session (step 420 ).
- the AT 20 initiates Point-to-Point Protocol (PPP) and Link Control Protocol (LCP) negotiations for access authentication (step 430 ).
- PPP Point-to-Point Protocol
- LCP Link Control Protocol
- the AN 30 generates a random challenge and sends the random challenge to the AT 20 in a Challenge Handshake Authentication Protocol (CHAP) Challenge packet to which the AT 20 responds with a CHAP response packet including a user-name attribute (step 440 ).
- CHAP response packet including a user-name attribute
- the AN 30 sends an Access-Request message based on the RADIUS protocol to the AAA server 70 (step 450 ).
- the AAA server 70 looks up a password based on the user-name attribute in the Access-Request message to authenticate the AT 20 .
- the AAA server 70 uses the authentication information stored in the AAA server 70 to locate the subscriber AT profile.
- the AAA server 70 includes the subscriber AT profile associated with the mobile node identification (MN ID) of the AT 20 (step 460 ).
- the AN 30 stores the subscriber AT profile within the session record for the AT 20 (step 470 ) and returns an indication of CHAP authentication success to the AT 20 (step 480 ).
- the AT 20 roams into a visitor AN 30 a within the same subnet 80 as the home AN 30 b during the data session
- the session record 350 including the subscriber AT profile 310 , created for the session in the home AN 30 b (i.e., home BSC 35 b ) can be transferred to the visitor AN 30 a (i.e., visitor BSC 35 a ) without re-negotiation of protocols or re-authentication.
- a new UATI request is sent to the new (target) AN 30 a (step 600 ).
- the new UATI request includes the old UATI assigned to the AT 20 by the original (source) AN 30 b .
- the source AN 30 b can be the home AN or another AN.
- the session may be able to be transferred from the source AN 30 b to the target AN 30 a using a session information request message from the target AN 30 a to the source AN 30 b (step 620 ).
- the 8-bit Color Code Identity field within the UATI only provides 256 alternatives, and therefore, the Color Code Identities may be re-used between subnets.
- the target AN 30 a may only be able to identify the source AN 30 b if the source AN 30 b is located within the same subnet as the target AN 30 a.
- the source AN 30 a Upon receipt of the session information request message (including the old UATI of the source AN 30 a ), the source AN 30 a uses the old UATI to locate the requested session record (step 630 ) and transfers the identified session record, including the subscriber AT profile, to the target AN 30 a via the A13 interface (step 640 ). The target AN 30 a activates the received session record (step 650 ) and transmits the assigned UATI for the target AN 30 a to the AT 20 (step 660 ). Authentication is not needed once the session record is fetched successfully. Thereafter, the target AN 30 a sends a session location update notification to the source AN 30 b , causing the session to become inactive (but not closed) in the source AN 30 b (step 670 ).
- the subscriber AT profile 310 can be downloaded from the home AAA server 70 b to the visitor AAA server 70 a once the AT 20 is successfully authenticated in the home AAA server 70 b .
- the visitor AAA server 70 a downloads the subscriber AT profile 310 to the visitor AN 30 a (i.e., visitor BSC 35 ) for storage in the session record 350 created for the data session.
- the visitor BSC 35 uses the subscriber AT profile 310 during the data session to provide subscribed services to the AT 20 .
- the AT 20 initiates a data session towards an AN 30 a that is not the home AN 30 b , after UATI assignment (step 800 ), session protocol negotiation (step 804 ) and the creation of a session record for the data session (step 810 ), the AT 20 engages in Point-to-Point Protocol (PPP) and Link Control Protocol (LCP) negotiations for access authentication (step 820 ) with the visitor AN 30 a .
- PPP Point-to-Point Protocol
- LCP Link Control Protocol
- the visitor AN 30 a During the access authentication process, the visitor AN 30 a generates a random challenge and sends the random challenge to the AT 20 in a Challenge Handshake Authentication Protocol (CHAP) Challenge packet to which the AT 20 responds with a CHAP response packet including a user-name attribute (step 830 ).
- CHAP Challenge Handshake Authentication Protocol
- the visitor AN 30 a receives the CHAP response packet from the AT 20 , the visitor AN 30 a sends an Access-Request message, including the user-name attribute to the visitor AAA server 70 a (step 840 ).
- CHAP Challenge Handshake Authentication Protocol
- the visitor AAA server 70 a uses the user-name attribute to determine the home AAA server 70 b , and forwards the Access-Request message to the home AAA server 70 b (step 845 ).
- the home AAA server 70 b looks up a password based on the user-name attribute in the Access-Request message to authenticate the AT 20 (step 850 ).
- the home AAA server 70 b uses the authentication information stored in the home AAA server 70 b to locate the subscriber AT profile (step 860 ), and downloads the subscriber AT profile, along with other information, such as the MN ID, in an Access-Accept As packet to the visitor AAA server 70 a (step 870 ).
- the visitor AAA server 70 a In the Access-Accept packet sent to the visitor AN 30 a (e.g., BSC), the visitor AAA server 70 a includes the subscriber AT profile associated with the MN ID of the AT 20 (step 875 ).
- the visitor AN 30 a stores the subscriber AT profile within the session record for the AT 20 (step 880 ) and returns an indication of CHAP authentication success to the AT 20 (step 890 ).
- the target AN 30 a may not be able to locate the source AN 30 b , and the session must be re-negotiated over the air interface as if the original session never existed.
- any attempted dormant handoff will fail since the correct source AN 30 b cannot be verified (i.e., the Color Code included in the previously assigned UATI is not recognized in the new subnet 80 a ). Therefore, upon entering a new subnet 80 a , the AT 20 must re-negotiate an entirely new session, as described above in connection with FIG. 8.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Databases & Information Systems (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
An Access Terminal (AT) profile for identifying data services subscribed to by a data-only (DO) AT or hybrid AT in data mode is stored within a data cellular network, such as a 1xEV DO cellular network. In one embodiment, the subscriber AT profile is stored in a home Access, Authentication and Accounting (AAA) server associated with a home Access Network (AN) of the AT. The subscriber AT profile stored in the home AAA server can be downloaded to the home AN at successful authentication. The current session record in the AN is expanded to include the subscriber profile. In another embodiment, when roaming in a visitor AN, the subscriber AT profile can be downloaded from the home AAA server to the visitor AAA server, prior to downloading the subscriber AT profile to the visiting AN.
Description
- 1. Field of the Invention
- The present invention relates generally to data cellular networks, and specifically to feature control in data cellular networks.
- 2. Description of Related Art
- High Data Rate (HDR) is a technology originally developed for dedicated packet data applications to meet the increasing demand for wireless Internet Protocol (IP) connectivity with high spectral efficiency. Voice transmissions require low data rates, but maintain stringent delay and jitter requirements. Packet data transmissions, on the other hand, typically require bursty high data rates, with less stringent delay and jitter requirements. The HDR principle is to separate high-speed data completely from the voice network, so that the packet data requirements can be fulfilled optimally and independently.
- In May 2000, the CDMA Development Group (CDG) accepted HDR as the 1xEvaluation Phase One: Data Only (1xEV DO or 1xEV Phase 1), with minor requirements for improvements. Within the 1xEV DO cellular network, data-only (DO) mobile terminals, hereinafter referred to as Access Terminals (AT), utilize data services by initiating data sessions with data-only base stations, hereinafter referred to as Access Networks (AN). The AN's transmit and receive data packets to and from AT's over the air interface, and support packet data speeds above 144 kbps. It should be understood that the term AT as used herein refers to both DO terminals that utilize only data services and hybrid mobile terminals that are capable of utilizing both data services and voice services, but are currently operating in data mode.
- To initiate a data session, an AT requests from a serving AN a Unicast Access Terminal Identifier (UATI) that uniquely identifies the AT within the serving AN. Upon receipt of the UATI, the AT engages in a session protocol negotiation and authentication process with the serving AN for the data session. After the protocols and protocol configurations are negotiated between the AT and the AN, the AT initiates Point-to-Point Protocol (PPP) and Link Control Protocol (LCP) negotiations for access authentication towards an Authentication, Authorization and Accounting (AAA) server via the AN. The AAA server maintains the subscriber information for authentication, authorization and accounting purposes.
- After successful authentication, the AN stores session information, such as supported protocols, authentication keys and Mobile Network ID (MNID) for later use in communications between the AT and the AN during the session. The UATI acts as a pointer to the session records within the AN. Packet data services for the data session are provided through a Packet Data Serving Node (PDSN) that interfaces between the transmission of data in the packet switched data network (e.g., Internet or Intranet), and the transmission of data over the air interface to/from the AT.
- However, beyond authenticating a data-only subscriber, there is currently no capability in the 1xEV DO cellular network for providing AT subscribed services. Therefore, it is not possible to provide feature-based services to the subscriber using either a DO AT or a hybrid AT. For example, a DO AT cannot be provided with certain subscribed services, such as multiple PPP sessions, priority delivery from PDSN, etc. In addition, a hybrid AT cannot have certain subscribed features, such as the ability to block incoming voice calls during a data call. Therefore, what is needed is a mechanism for providing an AT profile identifying data services subscribed to by the AT within the data cellular network.
- The present invention provides an Access Terminal (AT) profile for identifying data services subscribed to by a data-only (DO) AT or hybrid AT in data mode within a data cellular network, such as a 1xEV DO cellular network. In one embodiment, the subscriber AT profile is stored in a home Access, Authentication and Accounting (AAA) server associated with a home Access Network (AN) of the AT. The subscriber AT profile stored in the home AAA server can be downloaded to the home AN at successful authentication. The current session record in the AN is expanded to include the subscriber profile. In another embodiment, when roaming in a visitor AN, the subscriber AT profile can be downloaded from the home AAA server to the visitor AAA server, prior to downloading the subscriber AT profile to the visiting AN. Advantageously, once the subscriber AT profile is stored in the AN, any subscriber profile feature-based service can be controlled by the AN for the lifetime of the AT session.
- The disclosed invention will be described with reference to the accompanying drawings, which show important sample embodiments of the invention and which are incorporated in the specification hereof by reference, wherein:
- FIG. 1 is a block diagram illustrating a 1xEV DO cellular network;
- FIG. 2 is a flowchart illustrating the steps for initiating a data session within a 1xEV DO cellular network;
- FIG. 3 is a block diagram illustrating an exemplary subscriber AT profile within a data cellular network, in accordance with embodiments of the present invention;
- FIG. 4 is a flow diagram illustrating exemplary signaling for downloading the subscriber AT profile from the home AAA server to the home AN, in accordance with embodiments of the present invention;
- FIG. 5 is a block diagram illustrating an AT roaming scenario within a subnet of a data cellular network, in accordance with embodiments of the present invention;
- FIG. 6 is a flow diagram illustrating exemplary signaling for transferring the subscriber AT profile from the home AN to a visitor AN within the same subnet, in accordance with embodiments of the present invention;
- FIG. 7 is a block diagram illustrating an AT roaming scenario within a different subnet of a data cellular network, in accordance with embodiments of the present invention; and
- FIG. 8 is a flow diagram illustrating exemplary signaling for downloading the subscriber AT profile from the home AAA server to a visitor AAA server to initiate a data session, in accordance with embodiments of the present invention.
- The numerous innovative teachings of the present application will be described with particular reference to the exemplary embodiments. However, it should be understood that these embodiments provide only a few examples of the many advantageous uses of the innovative teachings herein. In general, statements made in the specification of the present application do not necessarily delimit any of the various claimed inventions. Moreover, some statements may apply to some inventive features, but not to others.
- FIG. 1 illustrates the basic architecture of a 1xEV DO
cellular network 10. An Access Terminal (AT) 20 is in wireless communication with an Access Network (AN) 30 for data services. The AT 20 is a device providing data connectivity to a user. For example, an AT 20 may be connected to a computing device, such as a laptop personal computer, or the AT 20 may be a self-contained data device, such as a personal digital assistant, the latter being illustrated. The AN 30 is the network equipment that provides data connectivity between a packet switched data network 60 (e.g., the Internet or an Intranet) and theATs 20. - For example, each
AN 30 can include the equivalent of one or more Base Transceiver Stations (BTSs) 32 (e.g., the physical RF interface equipment) and a Base Station Controller (BSC) 35. Each BTS 32 provides a separate 1.25 MHZ data-only (DO) carrier for high data rate applications for each sector (or cell) served by the BTS 32. TheBSC 35 is connected to each BTS 32 within theAN 30 via a respective Abis interface. In addition, theBSC 35 is responsible for operation, maintenance and administration of theBTSs 32 and handling the radio resources. It should be understood that theBSC 35 may be a separate node or may be co-located with one ormore BTSs 32. All of the BSC's 35 within a Color Code area or subnet 80 (e.g., group of AN's 30) are connected together via respective A13 interfaces. It should be noted that each subnet includes up to 256 neighboring AN's that are allowed to transfer session information between each other. - Packet data services are provided through a Packet Data Serving Node (PDSN)50 that interfaces between the transmission of data in the packet switched
data network 60, and the transmission of data over the air interface to/from theAT 20. The PDSN 50 interfaces with theAN 30 though a Packet Control Function (PCF) 40, which may or may not be co-located with theAN 30. The interface between theAN 30 and the PCF 40 is referred to as the A8/A9 interface, and the interface between the PCF 40 and the PDSN 50 is referred to as the A10/A11 interface. Access authentication of theAT 20 is performed by an Authentication, Authorization and Accounting (AAA)server 70 via an A12 interface between the AN 30 (BSC 35) and theAAA server 70. - In the 1xEV DO network, there are three packet data service states: Active/Connected, Dormant and Null/Inactive. In the Active/Connected state, a physical traffic channel exists between the
AT 20 and theAN 30, and either node may send data. In the Dormant state, no physical traffic exists between theAT 20 and theAN 30, but a Point-to-Point Protocol (PPP) link is maintained between theAT 20 and thePDSN 50. In the Null/Inactive state, there is no physical traffic channel between theAT 20 and theAN 30 and no PPP link between theAT 20 and thePDSN 50. The A8 connection is maintained during the Active/Connected state and released during transition to the Dormant or Null/Inactive state, while the A10 connection is maintained during the Active/Connected state and the Dormant state. - As used herein, a data session refers to a shared state between the
AT 20 and AN 30. This shared state stores at least the protocols and protocol configurations that are used for communication between theAT 20 and theAN 30 during the data session. The protocols and protocol configurations of the data session are negotiated between theAT 20 and AN 30 during initiation of the data session. A connection refers to a particular state of an air-link (e.g., a physical traffic channel being assigned or not assigned) between theAT 20 and AN 30. During a single data session, theAT 20 and theAN 30 can open and close a connection multiple times. - As shown in FIG. 2, to initiate a data session, an AT sends a Unicast Access Terminal Identifier (UATI) request to the AN (step200). The UATI uniquely identifies the AT within the AN, and further includes an 8-bit field that identifies the Color Code of the AN within a Color Code Area or subnet. Upon receipt of the UATI, the AT engages in a session protocol negotiation process with the serving AN (step 210). The session protocol negotiation process involves the negotiation of protocols and protocol configurations for a session associated with the AT, and the storage of the protocols and protocol configurations within the AT and AN for later use in communications between the AT and the AN during the session. The UATI acts as a pointer to the session records within the AN.
- After session configuration, the AT initiates Point-to-Point Protocol (PPP) and Link Control Protocol (LCP) negotiations for access authentication (step220). The access authentication process involves the AN generating a random challenge and sending the random challenge to the AT in a Challenge Handshake Authentication Protocol (CHAP) Challenge packet. When the AN receives the CHAP response packet from the AT, the AN sends an Access-Request message based on the RADIUS protocol to the AAA server. The AAA server looks up a password based on the user-name attribute in the Access-Request message, and if authentication passes, the AAA server sends an Access-Accept packet containing a RADIUS attribute having the mobile node identification (MN ID) therein to the AN. In response, the AN returns an indication of CHAP authentication success to the AT. The MN ID is used on the A8/A9 and A10/A11 interfaces to permit handoffs of PDSN packet data sessions between AN's.
- After authentication, the PCF initiates the setup of an A10 connection with the PDSN (step230), while the AT is in a Dormant state. After authentication, the AT can transition from the Dormant state to the Active/Connected state at any time during the session (step 240). For example, to transition to the Active/Connected state, the AT can send a connection request message to the AN, which in turn allocates radio resources (e.g., a physical traffic channel) to the AT (step 250) for use in sending/receiving data packets to/from the packet switched data network (step 260). If the AT does not transition to the Active/Connected state, the session remains open for a default duration of 54 hours. However, it should be understood that the session duration can vary depending upon the particular implementation. At the expiration of the original session (step 270), to be able to transmit/receive data packets, the AT must initiate a new data session (step 200) and engage in a new session protocol and authentication negotiation process (
steps 210 and 220) for the new data session. - Although the protocols and protocol configurations for each data session may differ between AT's and/or between AN's, the protocols and protocol configurations are dependent upon the type of AT and the protocols supported by the AN, and therefore, not under the control of the mobile subscriber (i.e., the mobile subscriber cannot subscribe to any of the protocols or protocol configurations). Without a centralized database (such as a Home Location Register) for storing subscribed services, data cellular networks have not been able to provide feature-based services to ATs. For example, such feature-based services could include multiple PPP sessions, priority delivery from PDSN and blocking of incoming voice calls during a data call (for hybrid ATs).
- Referring now to FIG. 3, in accordance with embodiments of the present invention, to provide feature-based services subscribed to by a data-only (DO) AT20 or hybrid AT in data mode within a data
cellular network 10, such as a 1xEV DO cellular network, a subscriber ATprofile 310 containing subscribed services can be stored in a home Access, Authentication and Accounting (AAA)server 70 associated with a home Access Network (AN) 30 of theAT 20. Thehome AAA server 70 can maintain a subscriber ATprofile 310 for each AT 20 registered with the associatedAN 30.Authentication information 300 for eachAT 20 points to the respective subscriber ATprofile 310. Therefore, upon successful authentication, the subscriber ATprofile 310 can be easily located in theAAA server 70. - In addition, the subscriber AT
profile 310 stored in thehome AAA server 70 can be downloaded to the home AN 30, along with the Access-Accept packet containing the MN ID, at successful authentication. Thecurrent session record 350 in the AN 30 (e.g., BSC 35) is also expanded to include the subscriber ATprofile 310. Once the subscriber ATprofile 310 is stored in theAN 30, any subscriber profile feature services can be controlled by theAN 30 during the data session. For example, if theAT 20 subscribes to a priority delivery service, theAN 30 can prioritize the sending of data packets to theAT 20 based on the priority delivery service features (e.g., packets from a certain IP address to theAT 20 are sent before packets from other IP addresses, packets to theAT 20 are sent before other AT packets, etc.). As another example, if theAT 20 subscribes to a multiple PPP session service, theAN 30 can establish an additional A10 connection (shown in FIG. 1) with the PDSN 50 (shown in FIG. 1) for theAT 20 to enable theAT 20 to download multiple data packets simultaneously (e.g., theAT 20 can access two web sites at the same time). After the data session expires, theAN 30 discards the session record, including the subscriber ATprofile 310. - The exemplary signaling involved in downloading the subscriber AT profile to the
AN 30 is illustrated in FIG. 4. Once a successful Unicast Access Terminal Identifier (UATI) assignment (step 400) has taken place between theAT 20 and theAN 30, theAT 20 engages in a session protocol negotiation process with the serving AN 30 (step 410), as described above. After session protocol negotiation, theAN 30 creates a session record for the data session and stores the negotiated protocols and protocol configurations therein for later use in communications between theAT 20 and theAN 30 during the session (step 420). - After session configuration, the
AT 20 initiates Point-to-Point Protocol (PPP) and Link Control Protocol (LCP) negotiations for access authentication (step 430). During the access authentication process, theAN 30 generates a random challenge and sends the random challenge to theAT 20 in a Challenge Handshake Authentication Protocol (CHAP) Challenge packet to which theAT 20 responds with a CHAP response packet including a user-name attribute (step 440). When theAN 30 receives the CHAP response packet from theAT 20, theAN 30 sends an Access-Request message based on the RADIUS protocol to the AAA server 70 (step 450). TheAAA server 70 looks up a password based on the user-name attribute in the Access-Request message to authenticate theAT 20. - If authentication passes and there is a subscriber AT profile associated with the
AT 20, theAAA server 70 uses the authentication information stored in theAAA server 70 to locate the subscriber AT profile. In the Access-Accept packet sent to the AN 30 (e.g., BSC), theAAA server 70 includes the subscriber AT profile associated with the mobile node identification (MN ID) of the AT 20 (step 460). In response, theAN 30 stores the subscriber AT profile within the session record for the AT 20 (step 470) and returns an indication of CHAP authentication success to the AT 20 (step 480). - If, as is shown in FIG. 5, the
AT 20 roams into a visitor AN 30 a within thesame subnet 80 as the home AN 30 b during the data session, thesession record 350, including the subscriber ATprofile 310, created for the session in the home AN 30 b (i.e.,home BSC 35 b) can be transferred to the visitor AN 30 a (i.e.,visitor BSC 35 a) without re-negotiation of protocols or re-authentication. For example, as shown in the signaling diagram of FIG. 6, if during the session, theAT 20 roams into an area served by adifferent AN 30 a (step 280), a new UATI request is sent to the new (target) AN 30 a (step 600). The new UATI request includes the old UATI assigned to theAT 20 by the original (source) AN 30 b. The source AN 30 b can be the home AN or another AN. - If the new (target) AN30 a is able to locate the original (source) AN 30 b based on the Color Code identity associated with the source AN 30 b included in the old UATI (step 610), the session may be able to be transferred from the source AN 30 b to the target AN 30 a using a session information request message from the target AN 30 a to the source AN 30 b (step 620). It should be understood that the 8-bit Color Code Identity field within the UATI only provides 256 alternatives, and therefore, the Color Code Identities may be re-used between subnets. Thus, the target AN 30 a may only be able to identify the source AN 30 b if the source AN 30 b is located within the same subnet as the target AN 30 a.
- Upon receipt of the session information request message (including the old UATI of the source AN30 a), the source AN 30 a uses the old UATI to locate the requested session record (step 630) and transfers the identified session record, including the subscriber AT profile, to the target AN 30 a via the A13 interface (step 640). The target AN 30 a activates the received session record (step 650) and transmits the assigned UATI for the target AN 30 a to the AT 20 (step 660). Authentication is not needed once the session record is fetched successfully. Thereafter, the target AN 30 a sends a session location update notification to the source AN 30 b, causing the session to become inactive (but not closed) in the source AN 30 b (step 670).
- In another embodiment, as shown in FIG. 7, when the
AT 20 is roaming in a visitor AN 30 a located in adifferent subnet 80 a than thesubnet 80 b of the original or home AN 30 b, or if theAT 20 initiates a data session towards an AN 30 a that is not the home AN 30 b, the former being illustrated, the subscriber ATprofile 310 can be downloaded from thehome AAA server 70 b to thevisitor AAA server 70 a once theAT 20 is successfully authenticated in thehome AAA server 70 b. Thevisitor AAA server 70 a downloads the subscriber ATprofile 310 to the visitor AN 30 a (i.e., visitor BSC 35) for storage in thesession record 350 created for the data session. Thevisitor BSC 35 uses the subscriber ATprofile 310 during the data session to provide subscribed services to theAT 20. - For example, as shown in FIG. 8, if the
AT 20 initiates a data session towards an AN 30 a that is not the home AN 30 b, after UATI assignment (step 800), session protocol negotiation (step 804) and the creation of a session record for the data session (step 810), theAT 20 engages in Point-to-Point Protocol (PPP) and Link Control Protocol (LCP) negotiations for access authentication (step 820) with the visitor AN 30 a. During the access authentication process, the visitor AN 30 a generates a random challenge and sends the random challenge to theAT 20 in a Challenge Handshake Authentication Protocol (CHAP) Challenge packet to which theAT 20 responds with a CHAP response packet including a user-name attribute (step 830). When the visitor AN 30 a receives the CHAP response packet from theAT 20, the visitor AN 30 a sends an Access-Request message, including the user-name attribute to thevisitor AAA server 70 a (step 840). - Since the
AT 20 is not registered in thevisitor AAA server 70 a, thevisitor AAA server 70 a uses the user-name attribute to determine thehome AAA server 70 b, and forwards the Access-Request message to thehome AAA server 70 b (step 845). Thehome AAA server 70 b looks up a password based on the user-name attribute in the Access-Request message to authenticate the AT 20 (step 850). If authentication passes and there is a subscriber AT profile associated with theAT 20, thehome AAA server 70 b uses the authentication information stored in thehome AAA server 70 b to locate the subscriber AT profile (step 860), and downloads the subscriber AT profile, along with other information, such as the MN ID, in an Access-Accept As packet to thevisitor AAA server 70 a (step 870). In the Access-Accept packet sent to the visitor AN 30 a (e.g., BSC), thevisitor AAA server 70 a includes the subscriber AT profile associated with the MN ID of the AT 20 (step 875). In response, the visitor AN 30 a stores the subscriber AT profile within the session record for the AT 20 (step 880) and returns an indication of CHAP authentication success to the AT 20 (step 890). - As another example, and as is shown in FIG. 7, if the
AT 20 roams into an area served by a new (target) AN 30 a located within adifferent subnet 80 a than the original (source) AN 30 b for the data session, the target AN 30 a may not be able to locate the source AN 30 b, and the session must be re-negotiated over the air interface as if the original session never existed. For example, if anAT 20 roams to a target AN 30 a that is not within thesame subnet 80 a as thesubnet 80 b of the source AN 30 b, any attempted dormant handoff will fail since the correct source AN 30 b cannot be verified (i.e., the Color Code included in the previously assigned UATI is not recognized in thenew subnet 80 a). Therefore, upon entering anew subnet 80 a, theAT 20 must re-negotiate an entirely new session, as described above in connection with FIG. 8. - As will be recognized by those skilled in the art, the innovative concepts described in the present application can be modified and varied over a wide range of applications. Accordingly, the scope of patented subject matter should not be limited to any of the specific exemplary teachings discussed, but is instead defined by the following claims.
Claims (24)
1. A data cellular network having a plurality of access networks, each of the plurality of access networks being capable of being in wireless communication with a plurality of access terminals to provide data connectivity between a packet switched data network and the plurality of access terminals during respective data sessions associated with the plurality of access terminals, said data cellular network comprising:
a server associated with only a select one of the plurality of access networks for authenticating the plurality of access terminals involved in respective data sessions via the select s access network, said sever being configured to maintain at least one subscriber profile identifying data services subscribed to by at least one of the plurality of access terminals registered with the select access network, said server further being configured to download said at least one subscriber profile to the select access network upon authentication of the associated at least one access terminal for use by the select access network during respective data sessions associated with the at least one access terminal.
2. The data cellular network of claim 1 , wherein said server is further configured to maintain authentication information for the at least one access terminal, said authentication information being used to determine said at least one subscriber profile associated with the at least one access terminal.
3. The data cellular network of claim 1 , wherein the data cellular network is a 1xEV DO cellular network, and wherein said server is further configured to download said at least one subscriber profile to the select access network in an Access-Accept packet.
4. The data cellular network of claim 1 , wherein the select access network includes a session record for a data session associated with a select one of the plurality of access terminals, said subscriber profile associated with the select access terminal being stored within said session record.
5. The data cellular network of claim 4 , wherein the select access network discards said session record upon termination of said data session associated with the select access terminal.
6. The data cellular network of claim 4 , wherein the select access network downloads said session record including said subscriber profile from an additional one of the plurality of access networks during said data session.
7. The data cellular network of claim 4 wherein said server is further configured to receive said subscriber profile associated with the select access terminal from an additional server associated with an additional one of the plurality of access networks having the select access terminal registered therewith and download said subscriber profile associated with the select access terminal to the select access network.
8. The data cellular network of claim 7 , wherein said server associated with the select access network is located within a first subnet of access networks and associated servers and said additional server associated with said additional access network is located within a second subnet of access networks and associated servers.
9. In a data cellular network having a plurality of access networks, each of the plurality of access networks being capable of being in wireless communication with a plurality of access terminals to provide data connectivity between a packet switched data network and the plurality of access terminals during respective data sessions associated with the plurality of access terminals, a select one of the plurality of access networks comprising:
a session record for a select one of the plurality of access terminals registered with the select access network and involved in a data session via the select access network;
means for downloading a subscriber profile identifying data services subscribed to by the select access terminal from a server associated with only the select access network; and
means for storing said subscriber profile within said session record for use during said data session.
10. The access network of claim 9 , wherein the data cellular network is a 1xEV DO cellular network, and wherein said means for downloading comprises means for receiving an Access-Accept packet from said server containing said subscriber profile.
11. The access network of claim 9 , further comprising:
means for discarding said session record upon termination of said data session associated with the select access terminal.
12. The access network of claim 9 , further comprising:
an additional session record for an additional one of the plurality of access terminals involved in an additional data session via the select access network;
means for downloading an additional subscriber profile identifying data services subscribed to by the additional access terminal from an additional one of the plurality of access networks having said additional data session previously associated therewith; and
means for storing said subscriber profile within said additional session record for use during said additional data session.
13. The access network of claim 9 , further comprising:
an additional session record for an additional one of the plurality of access terminals registered with an additional one of the plurality of access networks and involved in an additional data session via the select access network;
means for downloading an additional subscriber profile identifying data services subscribed to by the additional access terminal from an additional server associated with only said additional access network via said server; and
means for storing said subscriber profile within said additional session record for use during said additional data session.
14. The access network of claim 13 , wherein said select access network is located within a first subnet of access networks and associated servers and said additional access network is located within a second subnet of access networks and associated servers.
15. A method for providing data services subscribed to by mobile subscribers within a data cellular network having a plurality of access networks, each of the plurality of access networks being capable of being in wireless communication with a plurality of access terminals to provide data connectivity between a packet switched data network and the plurality of access terminals during respective data sessions associated with the plurality of access terminals, said method comprising the steps of:
maintaining at least one subscriber profile identifying data services subscribed to by at least one of the plurality of access terminals registered with the select access network within a server associated with only a select one of the plurality of access networks, said server further for authenticating the plurality of access terminals involved in respective data sessions via the select access network; and
downloading said at least one subscriber profile to the select access network upon authentication of the associated at least one access terminal for use by the select access network during respective data sessions associated with the at least one access terminal.
16. The method of claim 15 , further comprising the step of:
determining said at least one subscriber profile associated with the at least one access terminal using authentication information for the at least one access terminal.
17. The method of claim 15 , wherein the data cellular network is a 1xEV DO cellular network, and wherein said step of downloading further comprises the step of:
downloading said at least one subscriber profile to the select access network in an Access-Accept packet.
18. The method of claim 15 , further comprising the step of:
storing said downloaded subscriber profile associated with a select one of the plurality of access terminals within a session record for a data session associated with the select access terminal within the select access network.
19. The method of claim 18 , further comprising the step of:
discarding said session record from the select access network upon termination of said data session associated with the select access terminal.
20. A method for providing data services subscribed to by mobile subscribers within a data cellular network having a plurality of access networks, each of the plurality of access networks being capable of being in wireless communication with a plurality of access terminals to provide data connectivity between a packet switched data network and the plurality of access terminals during respective data sessions associated with the plurality of access terminals, said method comprising the steps of:
storing a session record for a select one of the plurality of access terminals registered with a select one of the plurality of access networks and involved in a data session via the select access network within the select access network;
downloading a subscriber profile identifying data services subscribed to by the select access terminal from a server associated with only the select access network; and
storing said subscriber profile within said session record for use during said data session.
21. The method of claim 20 , wherein the data cellular network is a 1xEV DO cellular network, and wherein said step of downloading further comprises the step of receiving an Access-Accept packet from said server containing said subscriber profile.
22. The method of claim 20 , further comprising the step of:
discarding said session record upon termination of said data session associated with the select access terminal.
23. The method of claim 20 , further comprising the steps of:
storing an additional session record for an additional one of the plurality of access terminals involved in an additional data session via the select access network within the select access network;
downloading an additional subscriber profile identifying data services subscribed to by the additional access terminal from an additional one of the plurality of access networks having said additional data session previously associated therewith; and
storing said subscriber profile within said additional session record for use during said additional data session.
24. The method of claim 20 , further comprising the steps of:
storing an additional session record for an additional one of the plurality of access terminals registered with an additional one of the plurality of access networks and involved in an additional data session via the select access network within the select access network;
downloading an additional subscriber profile identifying data services subscribed to by the additional access terminal from an additional server associated with only said additional access network via said server; and
storing said subscriber profile within said additional session record for use during said additional data session.
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/059,522 US20030145091A1 (en) | 2002-01-28 | 2002-01-28 | Access terminal profile in a data cellular network |
TW092101116A TW200306751A (en) | 2002-01-28 | 2003-01-20 | Access terminal profile in a data cellular network |
AU2003239055A AU2003239055A1 (en) | 2002-01-28 | 2003-01-27 | Access terminal profile in a data cellular network |
PCT/IB2003/000229 WO2003065738A2 (en) | 2002-01-28 | 2003-01-27 | Access terminal profile in a data cellular network |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/059,522 US20030145091A1 (en) | 2002-01-28 | 2002-01-28 | Access terminal profile in a data cellular network |
Publications (1)
Publication Number | Publication Date |
---|---|
US20030145091A1 true US20030145091A1 (en) | 2003-07-31 |
Family
ID=27609824
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/059,522 Abandoned US20030145091A1 (en) | 2002-01-28 | 2002-01-28 | Access terminal profile in a data cellular network |
Country Status (4)
Country | Link |
---|---|
US (1) | US20030145091A1 (en) |
AU (1) | AU2003239055A1 (en) |
TW (1) | TW200306751A (en) |
WO (1) | WO2003065738A2 (en) |
Cited By (33)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040008649A1 (en) * | 2002-07-10 | 2004-01-15 | Samsung Electronics Co., Ltd. | Apparatus and method for recovering communication sessions in a wireless network gateway |
US20040176113A1 (en) * | 2002-11-19 | 2004-09-09 | An Mei Chen | Method and apparatus for efficient paging and registration in a wireless communications network |
US20040229614A1 (en) * | 2003-04-29 | 2004-11-18 | Soo-Hwan Kim | Apparatus and method for processing data call in private wireless high-speed data system |
US20050090254A1 (en) * | 2003-10-27 | 2005-04-28 | Kyocera Corporation | Communication terminal |
US20050113082A1 (en) * | 2003-11-24 | 2005-05-26 | Bender Paul E. | Access terminal identification management |
WO2005086501A1 (en) * | 2004-02-27 | 2005-09-15 | Nortel Networks Limited | A fast call setup method |
US20060062180A1 (en) * | 2004-09-21 | 2006-03-23 | Sayeedi Shahab M | Method and apparatus to facilitate inter-AN HRPD hard handoff |
US20060072506A1 (en) * | 2004-09-21 | 2006-04-06 | Sayeedi Shahab M | Method and apparatus to facilitate inter-AN HRPD hard handoff |
EP1655985A2 (en) * | 2004-11-08 | 2006-05-10 | Lucent Technologies Inc. | Method for activating a dormant mobile unit in a distributed network |
US20060099929A1 (en) * | 2004-10-22 | 2006-05-11 | Frank Edward H | Authentication in a roaming environment |
US20060259628A1 (en) * | 2005-04-15 | 2006-11-16 | Samsung Electronics Co., Ltd. | Apparatus and method for triggering session re-negotiation between access network and access terminal in a high rate packet data system |
US20060274692A1 (en) * | 2003-03-05 | 2006-12-07 | Hwan-Chul Ryu | Handoff method in a high-rate packet data mobile communication system |
WO2007009116A1 (en) | 2005-07-14 | 2007-01-18 | Qualcomm Incorporated | Method and apparatus for session establishment for emergency voip calls |
US7269727B1 (en) * | 2003-08-11 | 2007-09-11 | Cisco Technology, Inc. | System and method for optimizing authentication in a network environment |
US20080089293A1 (en) * | 2006-10-12 | 2008-04-17 | Telefonaktiebolaget Lm Ericsson (Publ) | Inter-system handoffs in multi-access environments |
US20080162924A1 (en) * | 2006-12-29 | 2008-07-03 | Airvana, Inc. | Handoff of a secure connection among gateways |
US20080267116A1 (en) * | 2007-04-27 | 2008-10-30 | Yong Kang | Routing method and system for a wireless network |
US20100040018A1 (en) * | 2008-06-13 | 2010-02-18 | Praveen Kumar Appani | Apparatus and Method for Personality Modification During Handoff |
US20110153854A1 (en) * | 2009-12-17 | 2011-06-23 | Juniper Networks, Inc. | Session migration between network policy servers |
US8191128B2 (en) | 2003-11-28 | 2012-05-29 | Bce Inc. | Systems and methods for controlling access to a public data network from a visited access provider |
US8195159B1 (en) * | 2008-09-25 | 2012-06-05 | Rajveen Narendran | Session restoration upon return to EV-DO |
US20120201201A1 (en) * | 2008-05-14 | 2012-08-09 | Changming Liu | Predictive roaming between subnets |
US8483194B1 (en) | 2009-01-21 | 2013-07-09 | Aerohive Networks, Inc. | Airtime-based scheduling |
US8671187B1 (en) | 2010-07-27 | 2014-03-11 | Aerohive Networks, Inc. | Client-independent network supervision application |
US8787375B2 (en) | 2012-06-14 | 2014-07-22 | Aerohive Networks, Inc. | Multicast to unicast conversion technique |
US9002277B2 (en) | 2010-09-07 | 2015-04-07 | Aerohive Networks, Inc. | Distributed channel selection for wireless networks |
US9413772B2 (en) | 2013-03-15 | 2016-08-09 | Aerohive Networks, Inc. | Managing rogue devices through a network backhaul |
US9674892B1 (en) | 2008-11-04 | 2017-06-06 | Aerohive Networks, Inc. | Exclusive preshared key authentication |
US9900251B1 (en) | 2009-07-10 | 2018-02-20 | Aerohive Networks, Inc. | Bandwidth sentinel |
US10091065B1 (en) | 2011-10-31 | 2018-10-02 | Aerohive Networks, Inc. | Zero configuration networking on a subnetted network |
US10389650B2 (en) | 2013-03-15 | 2019-08-20 | Aerohive Networks, Inc. | Building and maintaining a network |
US11115857B2 (en) | 2009-07-10 | 2021-09-07 | Extreme Networks, Inc. | Bandwidth sentinel |
US11271937B2 (en) * | 2015-05-12 | 2022-03-08 | Telefonaktiebolaget Lm Ericsson (Publ) | Method and nodes for handling access to EPC services via a non-3GPP network |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE10308647B3 (en) * | 2003-02-27 | 2004-09-02 | Siemens Ag | Packet-switched data transmission in radio communications system involves network node's packet data service node sending command to profiling device with service identifier, service quality profile |
US7702364B2 (en) * | 2004-02-20 | 2010-04-20 | Telefonaktiebolaget Lm Ericsson (Publ) | Method and apparatus to reduce mobile switching center involvement in packet data call support |
US7561891B2 (en) | 2004-11-05 | 2009-07-14 | Research In Motion Limited | Customization of data session retry mechanism in a wireless packet data service network |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US2915220A (en) * | 1957-09-16 | 1959-12-01 | Sinclair Oil & Gas Company | Device for measuring gas |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5915220A (en) * | 1997-05-05 | 1999-06-22 | Northern Telecom Limited | System and method for maintaining profile information in a telecommunications network |
JP2001169341A (en) * | 1999-09-29 | 2001-06-22 | Fujitsu Ltd | Mobile communication service providing system, mobile communication service providing method, authentication device, and home agent device |
-
2002
- 2002-01-28 US US10/059,522 patent/US20030145091A1/en not_active Abandoned
-
2003
- 2003-01-20 TW TW092101116A patent/TW200306751A/en unknown
- 2003-01-27 AU AU2003239055A patent/AU2003239055A1/en not_active Abandoned
- 2003-01-27 WO PCT/IB2003/000229 patent/WO2003065738A2/en not_active Application Discontinuation
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US2915220A (en) * | 1957-09-16 | 1959-12-01 | Sinclair Oil & Gas Company | Device for measuring gas |
Cited By (98)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040008649A1 (en) * | 2002-07-10 | 2004-01-15 | Samsung Electronics Co., Ltd. | Apparatus and method for recovering communication sessions in a wireless network gateway |
US7212537B2 (en) * | 2002-07-10 | 2007-05-01 | Samsung Electronics Co., Ltd. | Apparatus and method for recovering communication sessions in a wireless network gateway |
US20040176113A1 (en) * | 2002-11-19 | 2004-09-09 | An Mei Chen | Method and apparatus for efficient paging and registration in a wireless communications network |
US20060274692A1 (en) * | 2003-03-05 | 2006-12-07 | Hwan-Chul Ryu | Handoff method in a high-rate packet data mobile communication system |
US8498264B2 (en) * | 2003-03-05 | 2013-07-30 | Samsung Electronics Co., Ltd. | Handoff method in a high-rate packet data mobile communication system |
US20040229614A1 (en) * | 2003-04-29 | 2004-11-18 | Soo-Hwan Kim | Apparatus and method for processing data call in private wireless high-speed data system |
US7359352B2 (en) * | 2003-04-29 | 2008-04-15 | Samsung Electronics Co., Ltd. | Apparatus and method for processing data call in private wireless high-speed data system |
US7269727B1 (en) * | 2003-08-11 | 2007-09-11 | Cisco Technology, Inc. | System and method for optimizing authentication in a network environment |
US8588804B2 (en) * | 2003-10-27 | 2013-11-19 | Kyocera Corporation | Communication terminal |
JP2005130374A (en) * | 2003-10-27 | 2005-05-19 | Kyocera Corp | Communication terminal |
CN100380848C (en) * | 2003-10-27 | 2008-04-09 | 京瓷株式会社 | communication terminal |
US20050090254A1 (en) * | 2003-10-27 | 2005-04-28 | Kyocera Corporation | Communication terminal |
US20050113082A1 (en) * | 2003-11-24 | 2005-05-26 | Bender Paul E. | Access terminal identification management |
US7130626B2 (en) * | 2003-11-24 | 2006-10-31 | Qualcomm, Inc. | Access terminal identification management |
US8191128B2 (en) | 2003-11-28 | 2012-05-29 | Bce Inc. | Systems and methods for controlling access to a public data network from a visited access provider |
US7948937B2 (en) | 2004-02-27 | 2011-05-24 | Ericsson Ab | Fast call setup method |
CN1947435B (en) * | 2004-02-27 | 2011-05-18 | 爱立信股份有限公司 | A fast call setup method |
US20070140252A1 (en) * | 2004-02-27 | 2007-06-21 | Haseeb Akhtar | Fast call setup method |
WO2005086501A1 (en) * | 2004-02-27 | 2005-09-15 | Nortel Networks Limited | A fast call setup method |
US20060072506A1 (en) * | 2004-09-21 | 2006-04-06 | Sayeedi Shahab M | Method and apparatus to facilitate inter-AN HRPD hard handoff |
US7620017B2 (en) * | 2004-09-21 | 2009-11-17 | Motorola, Inc. | Method and apparatus to facilitate inter-AN HRPD hard handoff |
US7512110B2 (en) * | 2004-09-21 | 2009-03-31 | Motorola, Inc. | Method and apparatus to facilitate inter-AN HRPD hard handoff |
US20060062180A1 (en) * | 2004-09-21 | 2006-03-23 | Sayeedi Shahab M | Method and apparatus to facilitate inter-AN HRPD hard handoff |
US20060099929A1 (en) * | 2004-10-22 | 2006-05-11 | Frank Edward H | Authentication in a roaming environment |
US8600356B2 (en) * | 2004-10-22 | 2013-12-03 | Broadcom Corporation | Authentication in a roaming environment |
US8190124B2 (en) * | 2004-10-22 | 2012-05-29 | Broadcom Inc. | Authentication in a roaming environment |
US7848749B2 (en) | 2004-11-08 | 2010-12-07 | Alcatel-Lucent Usa Inc. | Method and apparatus for activating a dormant mobile unit in a distributed network |
EP1655985A2 (en) * | 2004-11-08 | 2006-05-10 | Lucent Technologies Inc. | Method for activating a dormant mobile unit in a distributed network |
EP1655985A3 (en) * | 2004-11-08 | 2006-05-17 | Lucent Technologies Inc. | Method for activating a dormant mobile unit in a distributed network |
US20060099973A1 (en) * | 2004-11-08 | 2006-05-11 | Lucent Technologies, Inc. | Method and apparatus for activating a dormant mobile unit in a distributed network |
EP1763277A1 (en) * | 2004-11-08 | 2007-03-14 | Lucent Technologies Inc. | Method for activating a dormant mobile unit in a distributed network |
US7725722B2 (en) * | 2005-04-15 | 2010-05-25 | Samsung Electronics Co., Ltd. | Apparatus and method for triggering session re-negotiation between access network and access terminal in a high rate packet data system |
US20100223388A1 (en) * | 2005-04-15 | 2010-09-02 | Samsung Electronics Co., Ltd | Apparatus and method for triggering session re-negotiation between access network and access terminal in a high rate packet data system |
US8220044B2 (en) * | 2005-04-15 | 2012-07-10 | Samsung Electronics Co., Ltd. | Apparatus and method for triggering session re-negotiation between access network and access terminal in a high rate packet data system |
US7987505B2 (en) * | 2005-04-15 | 2011-07-26 | Samsung Electronics Co., Ltd. | Apparatus and method for triggering session re-negotiation between access network and access terminal in a high rate packet data system |
US20060259628A1 (en) * | 2005-04-15 | 2006-11-16 | Samsung Electronics Co., Ltd. | Apparatus and method for triggering session re-negotiation between access network and access terminal in a high rate packet data system |
KR101238652B1 (en) | 2005-04-15 | 2013-02-28 | 삼성전자주식회사 | Apparatus and method for triggering re-negitiation of session in a high rate packet data system |
WO2007009116A1 (en) | 2005-07-14 | 2007-01-18 | Qualcomm Incorporated | Method and apparatus for session establishment for emergency voip calls |
US8099075B2 (en) * | 2005-07-14 | 2012-01-17 | Qualcomm Incorporated | Method and apparatus for session establishment for emergency VoIP calls |
US20070110071A1 (en) * | 2005-07-14 | 2007-05-17 | Ramin Rezaiifar | Method and apparatus for session establishment for emergency VoIP calls |
US20080089293A1 (en) * | 2006-10-12 | 2008-04-17 | Telefonaktiebolaget Lm Ericsson (Publ) | Inter-system handoffs in multi-access environments |
US8644247B2 (en) * | 2006-10-12 | 2014-02-04 | Telefonaktiebolaget L M Ericsson (Publ) | Inter-system handoffs in multi-access environments |
US7926098B2 (en) * | 2006-12-29 | 2011-04-12 | Airvana, Corp. | Handoff of a secure connection among gateways |
US20080162924A1 (en) * | 2006-12-29 | 2008-07-03 | Airvana, Inc. | Handoff of a secure connection among gateways |
US8948046B2 (en) | 2007-04-27 | 2015-02-03 | Aerohive Networks, Inc. | Routing method and system for a wireless network |
US10798634B2 (en) | 2007-04-27 | 2020-10-06 | Extreme Networks, Inc. | Routing method and system for a wireless network |
US20080267116A1 (en) * | 2007-04-27 | 2008-10-30 | Yong Kang | Routing method and system for a wireless network |
US20130294245A1 (en) * | 2008-05-14 | 2013-11-07 | Aerohive Networks, Inc. | Predictive and Nomadic Roaming of Wireless Clients Across Different Network Subnets |
US9787500B2 (en) | 2008-05-14 | 2017-10-10 | Aerohive Networks, Inc. | Predictive and nomadic roaming of wireless clients across different network subnets |
US8483183B2 (en) * | 2008-05-14 | 2013-07-09 | Aerohive Networks, Inc. | Predictive and nomadic roaming of wireless clients across different network subnets |
US20120281630A1 (en) * | 2008-05-14 | 2012-11-08 | Changming Liu | Predictive and nomadic roaming of wireless clients across different network subnets |
US20120201201A1 (en) * | 2008-05-14 | 2012-08-09 | Changming Liu | Predictive roaming between subnets |
US8614989B2 (en) * | 2008-05-14 | 2013-12-24 | Aerohive Networks, Inc. | Predictive roaming between subnets |
US9338816B2 (en) | 2008-05-14 | 2016-05-10 | Aerohive Networks, Inc. | Predictive and nomadic roaming of wireless clients across different network subnets |
US9019938B2 (en) * | 2008-05-14 | 2015-04-28 | Aerohive Networks, Inc. | Predictive and nomadic roaming of wireless clients across different network subnets |
US10880730B2 (en) | 2008-05-14 | 2020-12-29 | Extreme Networks, Inc. | Predictive and nomadic roaming of wireless clients across different network subnets |
US9590822B2 (en) | 2008-05-14 | 2017-03-07 | Aerohive Networks, Inc. | Predictive roaming between subnets |
US10700892B2 (en) | 2008-05-14 | 2020-06-30 | Extreme Networks Inc. | Predictive roaming between subnets |
US10181962B2 (en) | 2008-05-14 | 2019-01-15 | Aerohive Networks, Inc. | Predictive and nomadic roaming of wireless clients across different network subnets |
US10064105B2 (en) | 2008-05-14 | 2018-08-28 | Aerohive Networks, Inc. | Predictive roaming between subnets |
US9025566B2 (en) | 2008-05-14 | 2015-05-05 | Aerohive Networks, Inc. | Predictive roaming between subnets |
US20100040018A1 (en) * | 2008-06-13 | 2010-02-18 | Praveen Kumar Appani | Apparatus and Method for Personality Modification During Handoff |
US9014137B2 (en) * | 2008-06-13 | 2015-04-21 | Qualcomm Incorporated | Apparatus and method for personality modification during handoff |
US8195159B1 (en) * | 2008-09-25 | 2012-06-05 | Rajveen Narendran | Session restoration upon return to EV-DO |
US10945127B2 (en) | 2008-11-04 | 2021-03-09 | Extreme Networks, Inc. | Exclusive preshared key authentication |
US9674892B1 (en) | 2008-11-04 | 2017-06-06 | Aerohive Networks, Inc. | Exclusive preshared key authentication |
US9867167B2 (en) | 2009-01-21 | 2018-01-09 | Aerohive Networks, Inc. | Airtime-based packet scheduling for wireless networks |
US8483194B1 (en) | 2009-01-21 | 2013-07-09 | Aerohive Networks, Inc. | Airtime-based scheduling |
US8730931B1 (en) | 2009-01-21 | 2014-05-20 | Aerohive Networks, Inc. | Airtime-based packet scheduling for wireless networks |
US10772081B2 (en) | 2009-01-21 | 2020-09-08 | Extreme Networks, Inc. | Airtime-based packet scheduling for wireless networks |
US10219254B2 (en) | 2009-01-21 | 2019-02-26 | Aerohive Networks, Inc. | Airtime-based packet scheduling for wireless networks |
US9572135B2 (en) | 2009-01-21 | 2017-02-14 | Aerohive Networks, Inc. | Airtime-based packet scheduling for wireless networks |
US9900251B1 (en) | 2009-07-10 | 2018-02-20 | Aerohive Networks, Inc. | Bandwidth sentinel |
US10412006B2 (en) | 2009-07-10 | 2019-09-10 | Aerohive Networks, Inc. | Bandwith sentinel |
US11115857B2 (en) | 2009-07-10 | 2021-09-07 | Extreme Networks, Inc. | Bandwidth sentinel |
US10057239B2 (en) * | 2009-12-17 | 2018-08-21 | Pulse Secure, Llc | Session migration between network policy servers |
US20110153854A1 (en) * | 2009-12-17 | 2011-06-23 | Juniper Networks, Inc. | Session migration between network policy servers |
US10523656B2 (en) | 2009-12-17 | 2019-12-31 | Pulse Secure, Llc | Session migration between network policy servers |
US9282018B2 (en) | 2010-07-27 | 2016-03-08 | Aerohive Networks, Inc. | Client-independent network supervision application |
US8671187B1 (en) | 2010-07-27 | 2014-03-11 | Aerohive Networks, Inc. | Client-independent network supervision application |
US10966215B2 (en) | 2010-09-07 | 2021-03-30 | Extreme Networks, Inc. | Distributed channel selection for wireless networks |
US9002277B2 (en) | 2010-09-07 | 2015-04-07 | Aerohive Networks, Inc. | Distributed channel selection for wireless networks |
US9814055B2 (en) | 2010-09-07 | 2017-11-07 | Aerohive Networks, Inc. | Distributed channel selection for wireless networks |
US10390353B2 (en) | 2010-09-07 | 2019-08-20 | Aerohive Networks, Inc. | Distributed channel selection for wireless networks |
US10833948B2 (en) | 2011-10-31 | 2020-11-10 | Extreme Networks, Inc. | Zero configuration networking on a subnetted network |
US10091065B1 (en) | 2011-10-31 | 2018-10-02 | Aerohive Networks, Inc. | Zero configuration networking on a subnetted network |
US10205604B2 (en) | 2012-06-14 | 2019-02-12 | Aerohive Networks, Inc. | Multicast to unicast conversion technique |
US9729463B2 (en) | 2012-06-14 | 2017-08-08 | Aerohive Networks, Inc. | Multicast to unicast conversion technique |
US8787375B2 (en) | 2012-06-14 | 2014-07-22 | Aerohive Networks, Inc. | Multicast to unicast conversion technique |
US10523458B2 (en) | 2012-06-14 | 2019-12-31 | Extreme Networks, Inc. | Multicast to unicast conversion technique |
US9565125B2 (en) | 2012-06-14 | 2017-02-07 | Aerohive Networks, Inc. | Multicast to unicast conversion technique |
US9008089B2 (en) | 2012-06-14 | 2015-04-14 | Aerohive Networks, Inc. | Multicast to unicast conversion technique |
US10542035B2 (en) | 2013-03-15 | 2020-01-21 | Aerohive Networks, Inc. | Managing rogue devices through a network backhaul |
US9413772B2 (en) | 2013-03-15 | 2016-08-09 | Aerohive Networks, Inc. | Managing rogue devices through a network backhaul |
US10389650B2 (en) | 2013-03-15 | 2019-08-20 | Aerohive Networks, Inc. | Building and maintaining a network |
US10027703B2 (en) | 2013-03-15 | 2018-07-17 | Aerohive Networks, Inc. | Managing rogue devices through a network backhaul |
US11271937B2 (en) * | 2015-05-12 | 2022-03-08 | Telefonaktiebolaget Lm Ericsson (Publ) | Method and nodes for handling access to EPC services via a non-3GPP network |
US11997091B2 (en) | 2015-05-12 | 2024-05-28 | Telefonaktiebolaget Lm Ericsson (Publ) | Method and nodes for handling access to EPC services via a non-3GPP network |
Also Published As
Publication number | Publication date |
---|---|
AU2003239055A1 (en) | 2003-09-02 |
WO2003065738A3 (en) | 2003-11-13 |
WO2003065738A2 (en) | 2003-08-07 |
TW200306751A (en) | 2003-11-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20030145091A1 (en) | Access terminal profile in a data cellular network | |
US7103662B2 (en) | System and method for improved session management in a data cellular network | |
JP4194840B2 (en) | Method and apparatus for wireless packet data service connection handoff | |
KR100970955B1 (en) | Communication method with wireless local area network (LAN) and selected public land mobile network (PLMNN) | |
US7675881B2 (en) | Interfacing a WLAN with a mobile communications system | |
US7773547B2 (en) | Method and apparatus for requesting point-to-point protocol (PPP) instances from a packet data services network | |
US20050130659A1 (en) | Method for optimizing handover between communication networks | |
US20040090937A1 (en) | Method and apparatus for performing inter-technology handoff from WLAN to cellular network | |
AU2002225975A1 (en) | Method and apparatus for handoff of a wireless packet data services connection | |
CA2391413A1 (en) | Method and apparatus for authentication in a wireless telecommunications system | |
EP1424810B1 (en) | A communication system and method of authentication therefore | |
US20060120171A1 (en) | Seamless handoff of mobile terminal | |
KR101075624B1 (en) | System and method for handoff between the heterogeneous systems | |
JP2004505568A (en) | Method and system for using RADIUS in UMTS for performing and roaming HLR functions | |
US20060002329A1 (en) | Method and system for providing backward compatibility between protocol for carrying authentication for network access (PANA) and point-to-point protocol (PPP) in a packet data network | |
KR100700887B1 (en) | Handoff Control Method between Mobile LAN Protocol Based LAN Network and CDM Network | |
KR20030093603A (en) | METHOD FOR AUTHENTICATION in wireless communication system for high rate packet data | |
US7391752B1 (en) | Method for generation of unique mobile station IDs in a 1×EVDO network | |
KR20050121119A (en) | Method for handoff of relation from portable internet to cdma2000 network | |
US20060002330A1 (en) | Method and system for providing network access to protocol for carrying authentication for network access (PANA) mobile terminals and point-to-point protocol (PPP) mobile terminals packet data network | |
CN101335978B (en) | Roaming limitation method for 1X EV-DO system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: TELEFONAKTIEBOLAGET LM ERICSSON (PUBL), SWEDEN Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:PENG, XIAOHONG;DHANEKULA, SREE LAKSHMI;EL-ARABAWY, AHMED;AND OTHERS;REEL/FRAME:012548/0619;SIGNING DATES FROM 20020121 TO 20020123 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |